2021
DOI: 10.1109/access.2021.3079312
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure

Abstract: In recent years, the Internet of things (IoT) has become an encouraging communication paradigm that has numerous applications including smart city, smart home and intelligent transportation system. The information sensed by several IoT smart devices can be security stored at the (cloud) servers. An external user, being a client, can access the services from a server for the sensing information, provided that a mutual authentication happens among them. Using the established session key among the user and the se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…In SEMS-5G, if steals the users' verifiers from the repository of CA, for instance HW u , the former will not be able to calculate mutually authenticated session key as constructed among the legal participants [49]. In our scheme, the calculation of session key SK must require access to Ui's smart card, shared secrets, and access to the private secret key of CA at the same time, which is based on the strong assumption of the capabilities related to the adversary [50].…”
Section: ) Resists Stolen Verifiers Attackmentioning
confidence: 99%
“…In SEMS-5G, if steals the users' verifiers from the repository of CA, for instance HW u , the former will not be able to calculate mutually authenticated session key as constructed among the legal participants [49]. In our scheme, the calculation of session key SK must require access to Ui's smart card, shared secrets, and access to the private secret key of CA at the same time, which is based on the strong assumption of the capabilities related to the adversary [50].…”
Section: ) Resists Stolen Verifiers Attackmentioning
confidence: 99%
“…The entire insecure public channel is completely under the control of attacker. We have used DY and CK threat model 29 in order to validate the proposed authentication and key agreement scheme. The proposed scheme is being compromised by the DY and CK threat model, which has complete control over insecure network traffic.…”
Section: Threat Modelmentioning
confidence: 99%
“…• The adversary can completely control communications over public channels by interfering with, modifying, or deleting messages. • The adversary can conduct offline password guessing by dictionary attack within the polynomial time [30]. • The adversary can obtain session-specific temporary information, such as a random nonce generated in each session [31].…”
Section: E Threat Modelmentioning
confidence: 99%